A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes
☆146Sep 8, 2015Updated 10 years ago
Alternatives and similar repositories for tortunnel
Users that are interested in tortunnel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool (and library) for TACKs☆31Jun 15, 2017Updated 8 years ago
- A tool for automated MITM attacks on SSL connections.☆570Dec 17, 2017Updated 8 years ago
- Viewer for Observing Multiple Computers using VNC☆19Feb 13, 2010Updated 16 years ago
- ☆384Sep 22, 2012Updated 13 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆2,052May 29, 2021Updated 4 years ago
- An agile, distributed, and secure alternative to the Certificate Authority system.☆635Mar 7, 2012Updated 14 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 13 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 10 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆145Aug 9, 2015Updated 10 years ago
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Simple shellcode decoder using unicorn-engine☆100Oct 17, 2015Updated 10 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆460Oct 16, 2023Updated 2 years ago
- A video-sharing web platform compatible with NextShare, a peer-to-peer streaming technology developed within European project P2P-Next☆15Nov 13, 2012Updated 13 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆64Jul 17, 2012Updated 13 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- ☆13May 4, 2014Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- NOISE creates "real-looking" text based upon a collection of reference texts, which can then be used in emails, tweets, web searches, IRC…☆15Apr 7, 2015Updated 11 years ago
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆16Mar 20, 2013Updated 13 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments